news analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian Constantin17 Nov 20234 minsRansomwareRansomwareRansomware news Major Australian ports shut down following cyber incidentBy Samira Sarraf12 Nov 20232 minsCyberattacksSupply ChainCybercrimenews Generative AI to fuel stronger phishing campaigns, information operations at scale in 2024By Samira Sarraf08 Nov 20236 minsPhishingCyberattacksGenerative AI news analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleBy Michael Hill 06 Nov 20235 minsRansomwareZero TrustCybercrime newsGovernments should not pay ransoms, International Counter Ransomware Initiative members agreeBy Michael Hill 02 Nov 20233 minsRansomwareGovernmentCybercrime opinionWhat the White House executive order on AI means for cybersecurity leadersBy Christopher Burgess 31 Oct 20236 minsCSO and CISOGovernmentThreat and Vulnerability Management brandpostSponsored by Palo Alto NetworksDefending Against Advanced Threats, Part 2By Stephanie Regan with David Moulton 25 Oct 20232 minsCybercrime brandpostSponsored by Palo Alto NetworksCSO_Defending Against Advanced Threats, Part 1 By Kristopher Russo with David Moulton 25 Oct 20232 minsCybercrime brandpostSponsored by SophosTech Leaders: Here’s what to focus on in security 24 Oct 20234 minsCybercrime Articlesnews analysisQakbot infrastructure dismantled in multinational cybercrime takedownMore than $8.6 million in cryptocurrency seized from the Qakbot cybercriminal organization and will aid victims.By Michael Hill 30 Aug 2023 5 minsBotnetsMalwareCybercrimenewsSuspected Met Police data breach potentially exposes sensitive officer, staff informationUnauthorised access at a supplier might have compromised names, ranks, photos, vetting levels, and pay numbers for officers and staff.By Michael Hill 29 Aug 2023 3 minsData BreachData PrivacyCybercrimenewsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeThe two, including a 17-year-old, were convicted for their part in attacks on Uber, Nvidia, and other companies.By Michael Hill 24 Aug 2023 2 minsHacker GroupsCybercrimenews analysisClop ransomware dominates ransomware space after MOVEit exploit campaignThe fast-rising Clop ransomware gang is capitalizing on compromising a single environment, underscoring the need to assess security of software supply chains.By Lucian Constantin 23 Aug 2023 4 minsRansomwareCybercrimenewsSt Helens Council hit by suspected ransomware attackLocal authority said internal systems have been affected, describing the incident as a “complex and evolving” situation.By Michael Hill 23 Aug 2023 3 minsRansomwareCyberattacksCybercrimefeature6 best practices to defend against corporate account takeover attacksWhen bad actors get control of business or corporate accounts, it can be more dangerous than comprised personal or consumer accounts. Here are some ways to stop them.By Linda Rosencrance 17 Aug 2023 10 minsBusinessCyberattacksCybercrimenewsUK police data breach exposes victim informationDisclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies.By Michael Hill 15 Aug 2023 3 minsData BreachIdentity TheftLegalnews analysisTakeovers of MFA-protected accounts increase, as Microsoft 365 phishing campaign showsThe new phishing campaign targets business executives and uses EvilProxy to defeat multifactor authentication.By Lucian Constantin 10 Aug 2023 5 minsMulti-factor AuthenticationPhishingCyberattacksnewsPolice Service of Northern Ireland discloses second data breach in as many daysPSNI reveals theft of documents including a spreadsheet containing the names of more than 200 serving police officers and staff.By Michael Hill 10 Aug 2023 2 minsData BreachData PrivacyCybercrimenewsRansomware victim numbers surge as attackers target zero-day vulnerabilitiesRansomware groups are also prioritizing the exfiltration of files, which has become the primary source of extortion.By Michael Hill 07 Aug 2023 8 minsRansomwareCyberattacksCybercrimenews analysisRansomware gang increases attacks on insecure MSSQL serversNew research shows a dramatic rise in double-extortion ransomware attacks by the Mallox group By Lucian Constantin 26 Jul 2023 3 minsRansomwareCyberattacksCybercrimenews analysisVEC campaign targets critical infrastructure firms with invoice fraud attackThreat actor compromised five different vendor email accounts and delivered email attacks to 15 individuals across five customer organizations.By Michael Hill 26 Jul 2023 5 minsEmail SecurityCyberattacksCybercrime Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How a digital design firm navigated its SOC 2 audit By Alex Levin 28 Nov 202311 mins CertificationsCertificationsIT Training news GE investigates alleged data breach into confidential projects: Report By Shweta Sharma 27 Nov 20233 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? By Christopher Burgess 27 Nov 20236 mins Generative AIGenerative AIGenerative AI podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO